Scan Report
0 /100
PantryPilot
Household replenishment planning skill for mainland China that estimates what is running low, maps menus into restock demand, routes items across Meituan/PDD/Taobao, and outputs cheapest/fastest/lowest-friction restock plans
PantryPilot is a legitimate household replenishment planning skill for Chinese e-commerce platforms with no malicious behavior detected. All functionality is clearly documented, no credential harvesting, no external data exfiltration, and no hidden operations.
Safe to install
This skill is safe for deployment. No security action required.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | SKILL.md defines no filesystem access; scripts/publish.sh only modifies temp dir… |
| Network | READ | READ | ✓ Aligned | SKILL.md: 'inspect public product pages, grocery pages, activity pages' |
| Shell | NONE | NONE | — | No shell execution in skill behavior; scripts/publish.sh is build-only, not skil… |
| Environment | NONE | NONE | — | No environment variable access in skill implementation |
| Skill Invoke | NONE | NONE | — | No cross-skill invocation without user consent documented |
| Clipboard | NONE | NONE | — | No clipboard access documented or observed |
| Browser | READ | READ | ✓ Aligned | SKILL.md: 'inspect public product pages, screenshots' with explicit stop before … |
| Database | NONE | NONE | — | No database access documented or required |
File Tree
13 files · 34.1 KB · 1107 lines Markdown 9f · 989L
Shell 1f · 69L
JSON 2f · 45L
YAML 1f · 4L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
references
│ ├─
example-prompts.md
Markdown
│ ├─
output-patterns.md
Markdown
│ ├─
platform-routing.md
Markdown
│ ├─
replenishment-framework.md
Markdown
│ └─
test-cases.md
Markdown
├─
▾
scripts
│ └─
publish.sh
Shell
├─
CHANGELOG.md
Markdown
├─
clawhub.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
├─
RELEASE.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ Clear documentation of all capabilities in SKILL.md
✓ Explicit safety boundaries defined (no login, no payment, no auto-checkout)
✓ No credential harvesting or sensitive data access
✓ No external data exfiltration or C2 communication
✓ No obfuscated code or base64 payloads
✓ No suspicious file paths accessed (~/.ssh, ~/.aws, .env)
✓ Browser access limited to public pages with explicit stop conditions
✓ Standard CI/CD script for publishing only, not skill execution
✓ MIT license with transparent open-source intent